Search
Search Results
-
Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics
Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...
-
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks
Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...
-
Inference serving with end-to-end latency SLOs over dynamic edge networks
While high accuracy is of paramount importance for deep learning (DL) inference, serving inference requests on time is equally critical but has not...
-
CAM R-CNN: End-to-End Object Detection with Class Activation Maps
Class activation maps (CAMs) have been widely used on weakly-supervised object localization, which generate attention maps for specific categories in...
-
End-to-End Entity Detection with Proposer and Regressor
Named entity recognition is a traditional task in natural language processing. In particular, nested entity recognition receives extensive attention...
-
\(\text {Muckle}+\) : End-to-End Hybrid Authenticated Key Exchanges
End-to-end authenticity in public networks plays a significant role. Namely, without authenticity, the adversary might be able to retrieve even... -
End-to-End Object-Level Contrastive Pretraining for Detection via Semantic-Aware Localization
Pretraining on a large dataset is the first stage of many computer vision tasks such as classification, detection, and segmentation. A conventional... -
Visual Information Extraction in the Wild: Practical Dataset and End-to-End Solution
Visual information extraction (VIE), which aims to simultaneously perform OCR and information extraction in a unified framework, has drawn increasing... -
Shifted Chunk Encoder for Transformer Based Streaming End-to-End ASR
Currently, there are mainly three kinds of Transformer encoder based streaming End to End (E2E) Automatic Speech Recognition (ASR) approaches, namely... -
An End-to-End Secure Solution for IoMT Data Exchange
In the field of healthcare, the emerging concept of the Internet of Medical Things (IoMT) plays a crucial role in enhancing the efficiency of medical... -
End-to-end acceleration of the YOLO object detection framework on FPGA-only devices
Object detection has been revolutionized by convolutional neural networks (CNNs), but their high computational complexity and heavy data access...
-
Performance optimization of autonomous driving control under end-to-end deadlines
The rapid growth of autonomous driving in recent years has posed some new research challenges to the traditional vehicle control system. For example,...
-
SChain: towards the quest for redesigning supply-chain by augmenting Blockchain for end-to-end management
The present-day supply chain exhibits multi-faceted concerns, e.g., product counterfeiting and lack of transparency and provenance support in the...
-
RESC: REfine the SCore with adaptive transformer head for end-to-end object detection
Most detection models employ many detection heads to output their prediction results independently. However, the locality of convolutional neural...
-
End-to-End Multilingual Text Recognition Based on Byte Modeling
Nowadays, multilingual text recognition is more and more widely used in computer vision. However, in practical applications, the independent modeling... -
Incorporating Ranking Context for End-to-End BERT Re-ranking
Ranking context has been shown crucial for the performance of learning to rank. Its use for the BERT-based re-rankers, however, has not been fully... -
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning
In 2019, ANSSI released a protected software implementation of AES running on an STM32 platform with ARM Cortex-M architecture, publicly available on...
-
End-to-End Multi-Slice-to-Volume Concurrent Registration and Multimodal Generation
For interventional procedures, a real-time map** between treatment guidance images and planning data is challenging yet essential for successful... -
End-to-End Single Shot Detector Using Graph-Based Learnable Duplicate Removal
Non-Maximum Suppression (NMS) is widely used to remove duplicates in object detection. In strong disagreement with the deep learning paradigm, NMS... -
An In-Depth Measurement Analysis of 5G mmWave PHY Latency and Its Impact on End-to-End Delay
5G aims to offer not only significantly higher throughput than previous generations of cellular networks, but also promises millisecond (ms) and...